Interview Questions Flashcards

1
Q

What is Microsoft Active Directory (AD), and why is it essential in identity management?

A

Microsoft Active Directory (AD) is a directory service developed by Microsoft that allows network administrators to manage and secure network resources, user access, and permissions within a Windows domain. It is essential for identity management because it centralizes user authentication and authorization, enabling single sign-on (SSO) capabilities, reducing redundant account management, and enhancing security across an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Entra ID, and how does it relate to identity management?

A

Entra ID (formerly Azure Active Directory) is Microsoft’s cloud-based identity and access management service, designed for managing access to applications and resources in a cloud environment. It supports secure sign-in and multi-factor authentication, enforces access controls based on organizational policies, and enables integration with on-premises AD, making it a powerful tool for identity management in hybrid and cloud-only environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can you explain what OAuth is and give an example of how it might be used?

A

OAuth is an open standard for authorization, commonly used for delegated access. It allows third-party applications to access a user’s resources without exposing credentials. For example, when a user logs into a website using their Google account, OAuth is used to allow access to their basic profile data without sharing the Google password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the difference between OAuth and OAuth2?

A

OAuth1 was the original protocol, but it had several limitations, such as requiring complex signatures for each API request. OAuth2, the improved version, is simpler and more secure. It allows token-based authentication, reducing complexity and allowing it to be widely adopted across web and mobile applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SAML, and how does it work in a single sign-on (SSO) context?

A

Security Assertion Markup Language (SAML) is an XML-based protocol used for SSO that enables secure exchange of authentication and authorization data between parties, typically an Identity Provider (IdP) and a Service Provider (SP). In an SSO scenario, a user logs in once through the IdP, which then shares authentication information with multiple SPs, allowing access to various applications without repeated logins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the main components of SAML?

A

The main components of SAML are the Identity Provider (IdP), which authenticates users, and the Service Provider (SP), which provides services based on the IdP’s authentication assertions. Additionally, SAML Assertions carry information about the user, such as their identity and entitlements, to the SP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is LDAP, and what is it commonly used for?

A

LDAP (Lightweight Directory Access Protocol) is an open protocol used to access and manage directory information services. It is commonly used for authenticating users and accessing directories like Active Directory. LDAP queries retrieve user data, permissions, and roles, facilitating centralized authentication and authorization in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does LDAP differ from Active Directory?

A

LDAP is a protocol, whereas Active Directory is a directory service implementing LDAP. While LDAP defines the communication standards, AD provides the actual directory management system with additional features, such as Kerberos-based authentication, group policies, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kerberos, and how are they used in Windows authentication?

A

Kerberos, the preferred choice, is a ticket-based protocol using a trusted third-party model, enhancing security by preventing replay and man-in-the-middle attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the advantages of using Kerberos over NTLM?

A

Kerberos offers stronger security with mutual authentication, reduced vulnerability to certain attacks, and better scalability in large networks. It also requires less network traffic and faster authentication compared to NTLM, which is generally less secure and not suitable for modern distributed environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If a user cannot access a specific application using SSO, what steps would you take to troubleshoot?

A

I would start by verifying the user’s account status and permissions. Next, I’d check the configuration of the SSO settings in both the IdP and SP, ensuring proper SAML configuration. Reviewing logs for SAML assertions can reveal mismatched settings or invalid tokens. I’d also confirm network connectivity and rule out browser or device issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How would you approach troubleshooting a Kerberos authentication failure?

A

I’d begin by checking the user’s account and SPN (Service Principal Name) setup in AD. I’d verify that the system clock is synchronized, as Kerberos is sensitive to time discrepancies. Reviewing logs on both the client and server can help diagnose ticket-related issues, and I’d also confirm network connectivity between the client and the Domain Controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is OpenID Connect (OIDC), and how does it differ from OAuth2?

A

OpenID Connect (OIDC) is an identity layer built on top of OAuth2, used for authentication rather than just authorization. While OAuth2 grants third-party applications access to user resources, OIDC extends this by verifying user identity and providing additional information about the user (such as their profile) through an ID token, making it suitable for Single Sign-On (SSO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the role of tokens in OAuth2. What are the common types of tokens used?

A

:** Tokens in OAuth2 are used to grant or verify access without exposing credentials. The common tokens are:
- Access Token: A short-lived token allowing access to specific resources.
- Refresh Token: A long-lived token used to obtain new access tokens.
- ID Token: Used in OpenID Connect for authentication, containing user profile information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is JSON Web Token (JWT), and why is it commonly used in identity management?

A

JSON Web Token (JWT) is a compact, URL-safe token format used for securely transmitting claims (like user identity) between parties. It’s commonly used in identity management because it enables stateless authentication, reducing server load, and can be signed or encrypted for added security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a VPN, and how does it enhance security?

A

A VPN (Virtual Private Network) creates a secure, encrypted connection between a user’s device and the network, effectively tunneling traffic through a private path. This enhances security by masking the user’s IP address, securing data transmission over public networks, and providing remote users secure access to an organization’s internal resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some common types of VPN protocols, and how do they differ?

A
  • IPsec: Securely encrypts and authenticates data packets, commonly used in site-to-site VPNs.
    • PPTP (Point-to-Point Tunneling Protocol): One of the oldest protocols, less secure, mostly phased out due to vulnerabilities.
    • L2TP (Layer 2 Tunneling Protocol): Often combined with IPsec for added security, used for both site-to-site and remote access VPNs.
    • OpenVPN: An open-source protocol known for flexibility and strong security, widely used for remote access.
    • WireGuard: A newer protocol focusing on simplicity, speed, and enhanced security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain a scenario where a VPN might fail to connect and how you would troubleshoot it.

A

If a VPN fails to connect, I’d first verify network connectivity and check if the VPN server is reachable. I’d then examine the VPN client configuration and credentials to ensure they are correct. Checking firewall settings, verifying that the necessary ports (e.g., UDP 1194 for OpenVPN) are open, and looking into VPN logs can also help pinpoint issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a firewall, and what are the main types of firewalls?

A

A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. The main types include:
- Packet-Filtering Firewall: Filters packets based on IP, port, and protocol.
- Stateful Inspection Firewall: Tracks active connections and makes decisions based on the state and context of traffic.
- Proxy Firewall: Acts as an intermediary between end users and resources, often inspecting packets at the application layer.
- Next-Generation Firewall (NGFW): Combines traditional firewall features with additional functions like intrusion prevention and application awareness.

20
Q

Describe how a firewall can help in securing identity management protocols like LDAP.

A

A firewall can restrict access to LDAP servers by allowing only specific IPs or ports (e.g., 389 for LDAP or 636 for LDAPS) from authorized devices. Additionally, a firewall can detect and block suspicious patterns or potential LDAP injection attempts, enhancing the security of sensitive identity management systems.

21
Q

What steps would you take to troubleshoot a firewall blocking legitimate traffic?

A

I’d start by reviewing the firewall logs to identify which rules are blocking the traffic. Then, I’d verify that the correct ports and protocols are allowed, update firewall rules as needed, and, if possible, test by temporarily disabling certain rules to confirm which rule is causing the issue.

22
Q

What is a proxy server, and how is it used in network security?

A

A proxy server acts as an intermediary between client devices and servers. It enhances security by hiding client IP addresses, filtering traffic, and logging user activities. Proxies are also used for content filtering, preventing access to certain websites, and monitoring network usage.

23
Q

What are the main types of proxies, and what is each type used for?

A
  • Forward Proxy: Sits between clients and external networks, used for filtering outbound requests and masking internal IP addresses.
    • Reverse Proxy: Placed between clients and internal servers, used for load balancing, caching, and protecting the identity of backend servers.
    • Transparent Proxy: Intercepts traffic without modifying it, commonly used for content filtering or monitoring.
    • Anonymous Proxy: Hides the user’s IP address but identifies itself as a proxy, used for privacy protection.
24
Q

Explain how a reverse proxy might be used to secure a web application.

A

A reverse proxy can secure a web application by hiding backend server details, distributing traffic to reduce load, and caching responses to improve performance. Additionally, it can enforce authentication, implement access controls, and inspect traffic for threats, acting as an added layer of security for sensitive applications.

25
A user reports being unable to connect to a company application through the VPN. How would you troubleshoot this?
- Check the VPN server’s status and ensure it’s accessible. - Verify that the user’s credentials are valid and that their device has the correct VPN configuration. - Confirm network connectivity and check if the necessary firewall ports for the VPN protocol are open. - Look at VPN and firewall logs to identify any blocked or dropped packets.
26
A client is experiencing slow connectivity when accessing resources through a proxy server. What might be the cause, and how would you investigate?
Possible causes could be high network traffic, misconfigured proxy caching, or inadequate resources on the proxy server. I would: - Check proxy server load and CPU/memory usage. - Review logs to see if traffic is being processed efficiently or if there are any error patterns. - Adjust caching settings or test bypassing the proxy to identify if the proxy is the source of latency.
27
How would you configure a firewall to allow only encrypted LDAP traffic?
I would configure the firewall to allow traffic only over port 636, which is used for LDAP over SSL (LDAPS). Additionally, I would set rules to permit only trusted IP addresses to access the LDAP server, enhancing security by limiting access to authorized sources only.
28
What is the 'whoami' command?
The `whoami` command is a simple command-line tool used to display the current user’s username. It is commonly available on Windows, Linux, and macOS operating systems.
29
Kernel
Kernelul este componenta centrală a unui sistem de operare care gestionează resursele hardware și permite interacțiunea între hardware și software. Kernelul acționează ca o interfață între aplicații și componentele hardware ale sistemului.
30
Windows Registry
Windows Registry este o bază de date ierarhică unde sunt stocate setările și opțiunile sistemului de operare Windows, ale aplicațiilor, ale utilizatorilor și ale dispozitivelor hardware.
31
User Rights Issues (Exemple)
Problemele legate de drepturile de utilizator includ permisiuni insuficiente pentru a accesa sau modifica fișiere, restricții de acces la resurse specifice sau configurări incorecte ale grupurilor de securitate, cum ar fi imposibilitatea de a instala software fără drepturi de administrator.
32
MSI Installer
MSI (Microsoft Installer) este un format de fișier utilizat pentru instalarea, întreținerea și eliminarea aplicațiilor software pe Windows. MSI este preferat pentru că asigură instalări structurate și automate, gestionând în mod eficient permisiunile și integritatea sistemului.
33
API
API-ul (Application Programming Interface) este un set de reguli și protocoale care permit aplicațiilor să comunice între ele. API-urile sunt frecvent folosite pentru a integra diferite servicii software, permițând accesul la funcționalități specifice fără a expune direct codul sursă.
34
Puțin Despre Splunk
Splunk este o platformă de analiză și vizualizare a datelor de jurnalizare (loguri) din infrastructuri IT și aplicații, fiind utilizat pentru monitorizare și securitate. Splunk permite colectarea, indexarea și corelarea datelor în timp real pentru detectarea anomaliilor și diagnosticarea problemelor.
35
Exemple de Trafic Normal și Overhead
- **Trafic Normal:** Reprezintă cereri legitime între servere și clienți, cum ar fi trimiterea și primirea de pachete fără erori sau reîncărcări. - **Overhead:** Se referă la traficul suplimentar necesar pentru controlul conexiunii, cum ar fi pachetele de confirmare (ACK) sau pachetele de retransmisie.
36
Ce Informații Soliciți la „Slowness” (Încetinire)
Întrebările pot include: - În ce aplicație sau serviciu apare problema? - La ce oră s-a manifestat încetinirea? - Câți utilizatori sunt afectați? - Există un model repetitiv sau este un eveniment izolat? - Ce modificări recente au fost făcute în sistem sau rețea?
37
Diferența Între SYN, ACK și RST
- **SYN:** Pachetul de inițiere a unei conexiuni TCP. - **ACK:** Pachetul de confirmare a recepționării unui mesaj TCP. - **RST:** Pachetul care indică o eroare și închide brusc conexiunea TCP.
38
Cum Verifici Dacă Traficul a Folosit TLS 1.2 în SSL
Poți verifica folosind un tool de analiză de rețea precum Wireshark, căutând versiunea protocolului TLS în pachetele de handshake (schimb de inițiere a conexiunii). TLS 1.2 va fi indicat în câmpul „Version” din pachetele SSL/TLS.
39
Diferența Între Persistent și Non-Persistent VDI
- **Persistent VDI:** Fiecare utilizator are un desktop virtual unic, iar schimbările rămân salvate între sesiuni. - **Non-Persistent VDI:** Utilizatorii folosesc un desktop generic care se resetează la fiecare sesiune, neavând schimbările salvate.
40
Ce Este „Golden Image”
Golden Image este o configurație de bază a unui sistem de operare și aplicații care poate fi clonată și utilizată ca referință pentru configurarea altor sisteme similare. Este folosită pentru a asigura consistența în mediul de lucru.
41
Ce Este FQDN
FQDN (Fully Qualified Domain Name) este numele complet al unui host în cadrul unei rețele, incluzând atât numele hostului cât și toate domeniile asociate, de exemplu, `host.example.com`.
42
Ce Este `regedit`
`regedit` este editorul de Registry Windows, folosit pentru a vizualiza, modifica și gestiona informațiile stocate în Windows Registry.
43
Kernelul Este o Interfață Între?
Kernelul este o interfață între hardware-ul fizic al sistemului și aplicațiile software. El asigură comunicarea între componentele hardware și procesele software care le utilizează.
44
Ce Este PPL (Protected Process Light)
PPL este un nivel de securitate pentru procesele de sistem în Windows, utilizat pentru a proteja procesele de securitate și a preveni modificarea lor de către alte procese nesigure sau potențial malițioase.
45
Care Este o Command Line pentru Permisiuni de Utilizator în OS
icacls "C:\Users\User\Desktop" /grant User:F
46